An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)

From MaRDI portal
Publication:4250756

DOI10.1007/3-540-48910-X_7zbMath0948.94008OpenAlexW1805062869MaRDI QIDQ4250756

Shafi Goldwasser, Ran Canetti

Publication date: 5 October 1999

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-48910-x_7



Related Items

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency, Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption, Adaptively secure distributed PRFs from LWE, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, Adaptively secure threshold symmetric-key encryption, Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions, Electronic jury voting protocols, Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model, Threshold public key encryption scheme resilient against continual leakage without random oracles, CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, Encapsulated search index: public-key, sub-linear, distributed, and delegatable, Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext, Efficient dynamic threshold identity-based encryption with constant-size ciphertext, Fuzzy asymmetric password-authenticated key exchange, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Provably secure threshold public-key encryption with adaptive security and short ciphertexts, Computational fuzzy extractors, Simplified Submission of Inputs to Protocols, A note on the security of KHL scheme, The reactive simulatability (RSIM) framework for asynchronous systems, Adaptively Secure Non-interactive Threshold Cryptosystems, Verifiable Elections That Scale for Free, Tag-KEM/DEM: A new framework for hybrid encryption, Efficient hybrid encryption from ID-based encryption, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Protecting against key-exposure: strongly key-insulated encryption with optimal threshold, Extensions of access structures and their cryptographic applications, Fair Traceable Multi-Group Signatures, Adaptively secure distributed PRFs from \(\mathsf{LWE}\), Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings, Efficient Threshold Encryption from Lossy Trapdoor Functions, Chosen-Ciphertext Secure Proxy Re-encryption without Pairings, Adaptively secure distributed public-key systems., Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts